IT risks Risk_description Jeopardizing Data Integrity in a Supply Chain Sector General Approaches/measures (Type) Proactive measures Approach_measure_description To avoid unsolicited access or tampering with supply chain data, strong encryption algorithms should be used Source Link